Blocking Endpoint Attacks

Table of contents:

Review Questions

You can find the solutions to these questions in Appendix A, "Answers to Review Questions."


What could be of interest to a hacker planning to attack an IP phone?

  1. The attacker can learn about the IP telephony environment.
  2. The attacker can start attacks from the IP phone.
  3. With a modified image and configuration file, the attacker can bring down the Cisco CallManager.
  4. The attacker can sabotage a special user.

Which IP phone does not support configuration file authentication?

  1. Cisco IP Phone 7920
  2. Cisco IP Phone 7940
  3. Cisco IP Phone 7960
  4. Cisco IP Phone 7970

In which window are IP phone security settings configured?

  1. Directory Number Configuration
  2. Phone Configuration
  3. Phone Security Configuration
  4. Product Specific Configuration

How do you browse to the built-in web server of an IP phone?

  1. http://IP-Phone's-IP-address
  2. https://IP-Phone's-IP-address
  3. https://IP-Phone's-IP-address/CCMAdmin
  4. https://IP-Phone's-IP-address/Admin

Which statement is not true about gratuitous ARP attacks?

  1. Gratuitous ARP is a man-in-the-middle attack.
  2. Gratuitous ARP attackers usually operate from the Internet.
  3. Gratuitous ARP is normally used for HSRP.
  4. Ettercap is a tool used for gratuitous ARP attacks.

Which of the following statements about authentication and encryption is not true?

  1. It was introduced with Cisco CallManager Release 4.0.
  2. Media streams use SRTP.
  3. Signaling uses Secure SCCP.
  4. TLS was formerly known as SSL.

Which of the following network information cannot be found out from a Cisco IP Phone?

  1. DHCP server address
  2. DNS server address
  3. TFTP server address
  4. Intranet server address
  5. Cisco CallManager address

You want to prevent users from accessing the PC port of a 7912 IP Phone. What option is available to you?

  1. Use the Cisco CallManager Phone Configuration window to disable the PC port.
  2. Use the CallManager service parameters to disable all PC ports.
  3. Use the Bulk Administration Tool to disable the PC port for all 7912 IP Phones.
  4. Fill the PC port of the phone with glue.

Which of the following was the predecessor of Transport Layer Security?

  1. IPsec
  2. SSL
  3. DES
  4. AES

What must you do to implement signed firmware validation on the Cisco IP Phones?

  1. Nothing; the feature is already enabled since CCM 3.3(3).
  2. Change the signed firmware setting from the Phone Configuration window.
  3. Change the signed firmware setting from the CallManager service parameters.
  4. Change the signed firmware setting from the IP phone itself.

Part I: Cisco CallManager Fundamentals

Introduction to Cisco Unified Communications and Cisco Unified CallManager

Cisco Unified CallManager Clustering and Deployment Options

Cisco Unified CallManager Installation and Upgrades

Part II: IPT Devices and Users

Cisco IP Phones and Other User Devices

Configuring Cisco Unified CallManager to Support IP Phones

Cisco IP Telephony Users

Cisco Bulk Administration Tool

Part III: IPT Network Integration and Route Plan

Cisco Catalyst Switches

Configuring Cisco Gateways and Trunks

Cisco Unified CallManager Route Plan Basics

Cisco Unified CallManager Advanced Route Plans

Configuring Hunt Groups and Call Coverage

Implementing Telephony Call Restrictions and Control

Implementing Multiple-Site Deployments

Part IV: VoIP Features

Media Resources

Configuring User Features, Part 1

Configuring User Features, Part 2

Configuring Cisco Unified CallManager Attendant Console

Configuring Cisco IP Manager Assistant

Part V: IPT Security

Securing the Windows Operating System

Securing Cisco Unified CallManager Administration

Preventing Toll Fraud

Hardening the IP Phone

Understanding Cryptographic Fundamentals

Understanding the Public Key Infrastructure

Understanding Cisco IP Telephony Authentication and Encryption Fundamentals

Configuring Cisco IP Telephony Authentication and Encryption

Part VI: IP Video

Introducing IP Video Telephony

Configuring Cisco VT Advantage

Part VII: IPT Management

Introducing Database Tools and Cisco Unified CallManager Serviceability

Monitoring Performance

Configuring Alarms and Traces

Configuring CAR

Using Additional Management and Monitoring Tools

Part VIII: Appendix

Appendix A. Answers to Review Questions


Authorized Self-Study Guide Cisco IP Telephony (CIPT)
Cisco IP Telephony (CIPT) (Authorized Self-Study) (2nd Edition)
ISBN: 158705261X
EAN: 2147483647
Year: 2004
Pages: 329 © 2008-2020.
If you may any questions please contact us: